{"id":297,"date":"2026-05-04T00:12:37","date_gmt":"2026-05-04T00:12:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nariewhiting\/?p=297"},"modified":"2026-05-04T00:12:37","modified_gmt":"2026-05-04T00:12:37","slug":"cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nariewhiting\/2026\/05\/04\/cia-triad\/","title":{"rendered":"CIA Triad"},"content":{"rendered":"\n<p>Narie Whiting<br>February 17, 2026<br>CYSE 200T<br>Professor Duvall<br><br>BLUF: CIA Triad is a transparent model of Confidentiality, Integrity, and Availability. It was<br>designed to provide guidance for different polices for information security within an<br>organization.<\/p>\n\n\n\n<p><strong>Confidentiality<\/strong><br>Confidentiality is very similar to privacy. It was made to help prevent private information<br>from being exposed to individuals without access to that information. Now it is very<br>common for data to be organized into sections based on how important and the type of<br>damage that can be done.<\/p>\n\n\n\n<p><strong>Integrity<\/strong><br>Integrity makes sure that data is maintained and accurate. This is to ensure that<br>unauthorized individuals cannot go into the system and alter the data information that is<br>being protected.<\/p>\n\n\n\n<p><strong>Availability<\/strong><br>Availability uses extreme measures to make sure that only authorized individuals have<br>access to important systems and applications. They make sure that data recovery and<br>business continuity plan is still intact in case of a data loss or a data breach.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><br>CIA Triad is a model of Confidentiality, Integrity, and Availability. Together they are known<br>for being the three most important concepts in data security. Provides guidance, evaluates<br>needs, and uses cases for potentially new technologies and perhaps new products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Narie WhitingFebruary 17, 2026CYSE 200TProfessor Duvall BLUF: CIA Triad is a transparent model of Confidentiality, Integrity, and Availability. It wasdesigned to provide guidance for different polices for information security within anorganization. ConfidentialityConfidentiality is very similar to privacy. It was made to help prevent private informationfrom being exposed to individuals without access to that information. Now&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nariewhiting\/2026\/05\/04\/cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":32195,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/users\/32195"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/posts\/297\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nariewhiting\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}